2022
DOI: 10.1007/978-3-031-09234-3_12
|View full text |Cite
|
Sign up to set email alerts
|

Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In both versions, the states are arranged as 4 × 4-array, where the size of each cell is 4-bit in SKINNY-64 case and 8-bit in SKINNY-128 case. The input state of rth round is denoted by [11] S r [12] S r [13] S r [14] S r [15] ⎞ ⎟ ⎟ ⎠ .…”
Section: Brief Description Of Skinny Block Ciphermentioning
confidence: 99%
See 1 more Smart Citation
“…In both versions, the states are arranged as 4 × 4-array, where the size of each cell is 4-bit in SKINNY-64 case and 8-bit in SKINNY-128 case. The input state of rth round is denoted by [11] S r [12] S r [13] S r [14] S r [15] ⎞ ⎟ ⎟ ⎠ .…”
Section: Brief Description Of Skinny Block Ciphermentioning
confidence: 99%
“…-1 in {P 0 [S 9 [15]], P 0 [S 10 [2]], P 0 [S 10 [14]]} as P 0 [S 9 [15]] = P 0 [S 10 [2]] ⊕ P 0 [S 10 [14]], -1 in {P 0 [S 9 [9]], P 0 [S 10 [7]], P 0 [S 10 [15]]} as P 0 [S 9 [9]] = P 0 [S 10 [7]]⊕P 0 [S 10 [15]], -2 in {P 0 [S 10 [8]], P 0 [S 10 [15]], P 0 [S 11 [2]], P 0 [S 11 [6]], P 0 [S 11 [14]]} as P 0 [S 10 [8]] = P 0 [S 11 [6]] ⊕ P 0 [S 11 [14]], P 0 [S 10 [15]] = P 0 [S 11 [2]] ⊕ P 0 [S 11 [14]], -1 in {P 0 [S 11 [11]], P 0 [S 11 [14]], P 0 [S 12 [1]], P 0 [S 12 [5]]} as P 0 [S 11 [11]] ⊕ P 0 [S 11 [14]] = P 0 [S 12 [1]] ⊕ P 0 [S 12 [5]].…”
Section: Precomputation Phasementioning
confidence: 99%
“…In accordance with the formalism employed in the present paper in the case of the A5/1 generator we considered the problem of inversion of function f A5/1 : {0, 1} 64 → {0, 1} 64 . ASG generator was studied in two variants earlier analyzed in papers [22], [31] using the SAT solvers: here we mean the functions f ASG 72 : {0, 1} 72 → {0, 1} 76 and f ASG 96 : {0, 1} 96 → {0, 1} 112 . For the Bivium cipher we considered the state recovery attack in the same formulation as in papers [32], [33], [34] and some others.…”
Section: A Considered Functions and Their Encodingsmentioning
confidence: 99%
“…In Table 5 and Table 6 we show the results of the automatic construction of linearizing set attacks on variants of ASG with key lengths 72 and 96 bits (ASG 72 and ASG 96 , respectively). Recall, that we considered the inversion problems for functions f ASG 72 : {0, 1} 72 → {0, 1} 76 and f ASG 96 : {0, 1} 96 → {0, 1} 112 . For ASG 72 and ASG 96 the keystream sizes were picked from [31].…”
Section: Linearizing Set Attacks On the Alternating Step Generatormentioning
confidence: 99%
See 1 more Smart Citation